4MARK Reith, CLINT Carr, GREGG Gunsch.An examination of digital forensic models[J].International Journal of Digital Evidence. 2002, 1 (3):25-28.
5BRADFORD P G, BROWN M, PERFUE J,et al.Towards proactive computer-system forensics[A]. Proceedings of the International Conference on Information Technology: Coding and Computing[C].2004,648-652.
6ALEC Yasinsac, YANET Manzano. Policies to enhance computer and network forensics[A].2001 IEEE Workshop on Information Assurance and Security[C].United States Military Academy:West Point, NY, 2001,289-295.
8DANIELS Thomas E.A functional reference model of passive systems for tracing network traffic[J].Digital Investigation,2004,1(1):69-81.
9STALLARD Tye,LEVITT Karl. Automated analysis for digital forensic science: semantic integrity checking[A]. Proceedings of Computer Security Applications Conference[C].2003,160-167.
10CHRISTOPHER Elsaesser,MICHAEL C Tanner. Automated diagnosis for Computer Forensics[EB/OL]. http://www.mitre.org/work/tech_papers/tech_papers_01/elsaesser_forensics/esaesser_forensics.pdf,2001-01-07/2005-04-28.